Check Point recently identified a zero-day information disclosure vulnerability impacting its Network Security gateways. Find out what you need to know about CVE-2024-24919.
Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!
In this post we explore the significant shift in the cybersecurity landscape driven by AI advancements. Featuring insights from a panel of seasoned security experts, the blog delves into current misconceptions, exciting developments, and surprising findings in AI-driven cybersecurity.
In this post we examine the resurgence of honeypots, highlighting their importance as a critical defense against sophisticated attackers who have adapted to evade traditional threat intelligence methods.
From incredible technical talks to insightful career advice from industry leaders, there was something for everyone. We strongly encourage you to watch each of the talks and soak in the wisdom shared by our stellar lineup of speakers.
Go inside the 2024 Verizon Data Breach Investigations Report (DBIR) to discover key takeaways and insights as GreyNoise analyzes the rise of vulnerability exploitation in cyber attacks.
Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!
Discover how GreyNoise seamlessly integrates robust security with intuitive design, empowering users with user-centric solutions. From clutter-free interfaces to inclusive design philosophy, explore how our commitment to simplicity and accessibility transforms cybersecurity.
Curious about decrypting Fortinet's FortiOS 7.0.x firmware? In the latest Grimoire post, we delve into the technical details of doing just that, revealing a hardcoded key used in the ChaCha20 encryption algorithm and the steps required to extract the decrypted rootfs.gz file.
GreyNoise celebrates reaching its 1,337th tag, attributing its success to the practical use of AI, particularly the creation of Sift. This has led to increased tag creation and expanded coverage of vulnerabilities.
On April 12th, 2024, Palo Alto Networks disclosed CVE-2024-3400, a critical command injection vulnerability in PAN-OS software versions 10.2, 11.0, and 11.1, allowing unauthenticated attackers to run arbitrary code with root privileges on affected firewalls when GlobalProtect gateway and device telemetry are active.
In this post, you'll discover how GreyNoise is reshaping cybersecurity using AI, with initiatives for anomaly discovery and targeted attack identification. Also, get up to speed on our new plug-in for Microsoft Copilot for Security.
Stay informed about a critical remote code execution vulnerability affecting D-Link NAS devices. It is being tracked under CVE-2024-3273 and believed to affect as many as 92,000 devices.
GreyNoise is announcing the launch of NetNoiseCon, an online conference series hosted by GreyNoise aimed at advancing InfoSec education and fostering community collaboration, featuring technical talks and career advice from industry experts.
Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!
This post steps through the process of discovering CVE-2024-21762, a non-disclosed out-of-bounds write vulnerability in Fortinet FortiOS and FortiProxy
This post explores the utility and methodology behind GreyNoise tags, emphasizing their role in analyzing network data from a non-IP-centric perspective to identify patterns, behaviors, and potential threats.
This post introduces GreyNoise Labs' series on BTLE, highlighting its privacy and security implications, as well as the journey from basic usage to sophisticated system development, offering insights for cybersecurity professionals and tech enthusiasts alike.
Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!
Checked
2 hours 55 minutes ago
Get the latest tips and stories on improving information security.